2010 Integrated Communications, Navigation, and Surveillance Conference Proceedings 2010
DOI: 10.1109/icnsurv.2010.5503322
|View full text |Cite
|
Sign up to set email alerts
|

Aeronautical mobile airport communications system development status

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Consistent with [23], a Hamming window function was implemented. The complex I − Q components of Gabor coefficients G mk and GW T mk , generated respectively in (8) and (9), can be used to compute corresponding T-F magnitude and phase responses. Figure 3 shows representative magnitude responses, at SN R = 0 dB, for the GT and GWT used for generation of RF-DNA fingerprints and the results presented in Sect.…”
Section: Gabor-based Rf-dna Fingerprintingmentioning
confidence: 99%
See 1 more Smart Citation
“…Consistent with [23], a Hamming window function was implemented. The complex I − Q components of Gabor coefficients G mk and GW T mk , generated respectively in (8) and (9), can be used to compute corresponding T-F magnitude and phase responses. Figure 3 shows representative magnitude responses, at SN R = 0 dB, for the GT and GWT used for generation of RF-DNA fingerprints and the results presented in Sect.…”
Section: Gabor-based Rf-dna Fingerprintingmentioning
confidence: 99%
“…The motivation for considering Worldwide Interoperability for Microwave Access (WiMAX) signals is provided by 1) the continued proliferation of IEEE 802.16e last mile communications, to include Long Term Evolution (LTE), and 2) potential adoption of an IEEE 802.16e compliant solution for next generation airport communication services as being pursued by the FAA, Eurocontrol and International Civilian Aviation Organization (ICAO) [8], [9]. WiMAX architectures are based on Wireless Access Points (WAP) that are among the top 10 IT threats [10] and unauthorized access to public safety services is a major concern [9].…”
Section: Introductionmentioning
confidence: 99%
“…The WAP security threat (unauthorized access, device spoofing, cloning, etc.) is of even greater concern when considering WiMAX implementations involving public safety [14].…”
Section: Introductionmentioning
confidence: 99%
“…WiMAX signals are considered here for demonstration given 1) commercial equipment is readily available (Alvarion BreezeMAX Extreme 5000 equipment used here), 2) the anticipated proliferation of IEEE 802.16e compliant equipment, or variants thereof such as Long Term Evolution (LTE), and 3) the potential adoption of a WiMAX variant for next generation airport communications by the FAA, Eurocontrol and International Civilian Aviation Organization (ICAO) [13], [14]. Furthermore, WiMAX systems use a Wireless Access Point (WAP) architecture which remains among the top 10 Information Technology (IT) security threats [15].…”
Section: Introductionmentioning
confidence: 99%